Accepted to IEEE ICC 2017

Our paper submitted to IEEE International Conference on Communications (ICC 2017) got accepted. Congrats Mizuno-kun!

S. Mizuno, M. Hatada, T. Mori, and S. Goto,
BotDetector: A robust and scalable approach toward detecting malware-infected devices,” Proceedings of the IEEE International Conference on Communications (ICC 2017), May 2017 (acceptance rate, ICC CISS: 30.5%=84/275) (to appear).

Screen Shot 2017-01-29 at 10.32.18

Accepted to Elsevier Computers & Security

Our paper submitted to Elsevier Computers & Security got accepted. This work was done by Dr. Mitsuaki Akiyama, NTT Network Technology Labs. Congrats Akiyama-san!

M. Akiyama, T. Yagi, T. Yada, T. Mori, and Y. Kadobayashi,
Analyzing the Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots,”
Elsevier Computers & Security, vol. xx, issue xx, xx 2017, Pages xxxx–xxxx [online version] (in press)

Presented a poster at ACM CCS 2016

Sun-san presented a poster at ACM CCS 2016. We got many useful feedback from the attendees.

Bo Sun, Akinori Fujino, and Tatsuya Mori,
Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs,” (poster presentation) 23rd ACM Conference on Computer and Communications Security 2016 (ACM CCS 2016), Vienna, Austria, Oct 2016. [paper] (acceptance rate: 41.3%=38/92)


Presented three invited talks at APAN42

We presented the following three invited talks at the network security workshop of the 42nd APAN meeting. All these talks make use of machine learning techniques to solve the network security problems.
BTW, we survived the Typhoon Nida, which hit us at the venue. Look at the power of pink!

 

  • Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, and Tatsuya Mori, “Automatic Generation of URL Blacklist
  • Mitsuhiro Hatada and Tatsuya Mori, “Analytics of Malware Traffic: Clustering and its Evaluation
  • Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, and Shigeki Goto, “Detecting malware-infected hosts using HTTP fingerprints